CmptrWz's Random Snippets

Use of Snippets
As a general note: All snippets in this thread can be considered up for adoption, with a couple of basic conditions:
  1. If you use my actual text, in whole or in part, please credit me.
  2. Please drop a note here stating that you've started a story based on a snippet, with link(s) as appropriate. Even if the site says "there haven't been any posts here for a while..."
Though as of this posting, people without a sufficient messages count can't bypass the warning on replies. Feel free to message me directly if that's the case.
 
A big butterfly for the Bay here is that Taylor will probably get her jetpack right off the bat. Actually, that could let her go with a flying insect name like Butterfly or Hornet, which is much nicer than Skitter.
 
Why can I see Dragon sending one of her suits to pick up Taylor from Winslow in full view of the Trio of Bitches, state that it's been to long since she hung out with her favorite cousin and then fly her home
Because you aren't considering that making Taylor a target. Only known family of Dragon would be a tempting target for some villains.
True, but then they have to think. If Dragon is openly claiming a CIVILIAN as her family, what crazy Tinker Tech Security does that girls house have and how likely are they to survive trying to kidnap her. Or even better, how HARD will Dragon hit them if even a hair is outta place on her FAVORITE cousin's head?

But most criminals don't think (very much, at least). The ones who do usually think "But I'm smarter than they are", which winds up with the same result.

A big butterfly for the Bay here is that Taylor will probably get her jetpack right off the bat. Actually, that could let her go with a flying insect name like Butterfly or Hornet, which is much nicer than Skitter.
Hornet may be a bit too aggressive for a hero, depending, and Butterfly probably not aggressive enough for a combat cape (leaving aside the fridge horror of blood-drinking butterfly swarms). I'd suggest "Velvet Ant" but those can't fly (they are a type of wasp, and quite pretty). Dragonfly might wind up a bit too-obviously linked to Dragon, but could be a good option, and offers a lot of realistic color options, much like Butterfly would.
 
And sends himself on a wild goose chase due to good security practice of "remove dormant credentials..."
Until something like COVID happens and all the desktop computers in the building go unused for more than a month and so their credentials are revoked, and now they ALL have to be reimaged before they can be used again because for some reason they can't simply reactivate the credentials.
Oh, and anyone who didn't save their data to the server lost it because the individual workstations are not routinely backed up because they are supposed to save to their folder on the server that can be accessed remotely.
Been there, got several temp jobs doing the re-imaging.
A lot of things done in the name of "good security practice" just make headaches and deny access to your own technology.
But most criminals don't think (very much, at least). The ones who do usually think "But I'm smarter than they are", which winds up with the same result.
Oh they think. They just think the rules don't apply to them, or that they won't get caught, which falls into the latter category of "I'm smarter".
Hornet may be a bit too aggressive for a hero, depending, and Butterfly probably not aggressive enough for a combat cape (leaving aside the fridge horror of blood-drinking butterfly swarms). I'd suggest "Velvet Ant" but those can't fly (they are a type of wasp, and quite pretty). Dragonfly might wind up a bit too-obviously linked to Dragon, but could be a good option, and offers a lot of realistic color options, much like Butterfly would.
Ever hear of the famous hero Green Hornet? He is sort of similar to Batman or Green Arrow in that he fights crime using non-tinkertech gadgets without super powers.
NOT a Worm character, he long predates Worm.
 
Nice idea!

I wonder how that call to Armsmaster went?

Dragon: Collin please stop threatening my favorite cousin! I know she looks a little menacing, but she is in that edgy teenage phase. I'm working on it with her, I just need to get some federal agents arrested for her and then she should be able to relax a bit.
Armsmaster: o_O wait, what was that about arresting people? And since when do you have a cousin?
 
True, but then they have to think. If Dragon is openly claiming a CIVILIAN as her family, what crazy Tinker Tech Security does that girls house have and how likely are they to survive trying to kidnap her. Or even better, how HARD will Dragon hit them if even a hair is outta place on her FAVORITE cousin's head?
It's also going to put her on top of Saint's Villainous To Do list. And Saint would be more than willing to take that risk to regain control of one of Richter's remote access terminals, or leverage over Dragon.
For that matter, pretty much everybody would be willing to take a run at the Heberts to either get revenge or obtain leverage on Dragon.

A sniper rifle from a couple hundred yards while Taylor's at a bus stop on the way to/from Winslow isn't something Dragon can stop without a ridiculous level of resource investment in 24/7 security bubbles. Or, because Saint, rockets into the bus Taylor's riding.

Dragon would need to spend literally all her time on keeping Taylor and Danny safe in order to actually be able to do so, instead of all the other things she does.


Much safer for Dragon to build a new avatar that can pass as human, ie an Infiltrator type Terminator, or a human replica droid, or another type fictional android, to spend time with her cousin.
Oh, sure, Dragon's almost certainly working on giving Taylor and Danny security systems that are linked to her, but a human-seeming avatar would be more effective in getting Danny to go along with it.
 
Until something like COVID happens and all the desktop computers in the building go unused for more than a month and so their credentials are revoked, and now they ALL have to be reimaged before they can be used again because for some reason they can't simply reactivate the credentials.

Oh, and anyone who didn't save their data to the server lost it because the individual workstations are not routinely backed up because they are supposed to save to their folder on the server that can be accessed remotely.
Been there, got several temp jobs doing the re-imaging.
A lot of things done in the name of "good security practice" just make headaches and deny access to your own technology.

The "dormant credentials" being deactivated were the current admin access ones for Dragon, I believe. Not a universal "every dormant credential, everywhere, from here until indefinitely in the future".

Setting her own password had been needed before she could then examine what programs were running. This included full access to the listed bank accounts, plus several additional ones. Three of the accounts didn't appear to have had any significant activity for years, but the rest were obviously active. Four other terminals were listed, but three were 'offline'. The last was very much active, but listed as being a lower-security backup terminal...with everything it did logged such that this one could see it.

It was finding the list of programs that had her freaking out a little, specifically finding that one of them self-identified as 'Dragon'. And from looking at the output from things, that had to be the Dragon...with the other terminal constantly messing with her systems.

Using the 'revoke credentials and trigger remote self-destruct' option probably wasn't the best option, but being able to track someone else pulling shit wasn't useful if you couldn't safely tell anyone and ensuring that the assholes with the other terminal couldn't continue to use it for anything was more important. Following that up by revoking the credentials for the terminals that hadn't been seen in years was more basic security maintenance than anything else, in her opinion.

Yeah, it was specifically revoking the credentials of the 3 dormant access terminals, after triggering the self destruct on the one Saint had.

Ever hear of the famous hero Green Hornet? He is sort of similar to Batman or Green Arrow in that he fights crime using non-tinkertech gadgets without super powers.
NOT a Worm character, he long predates Worm.

Note that Green Hornet is presumed by criminals and authorities to be a criminal. And this is because Green Hornet goes undercover as a criminal to fight crime.
 
Last edited:
... let me guess, the researchers were doing it for a bet, a dare or "Why the hell not?"? Trust me, I'm Italian too, I know.

I included as much as I remembered, so you (or whoever) can google it as well as I can if you're really curious. But I have Italian friends, so I 100% believe it.

As much as I like the name Skitter, this also provides the opportunity for Dragon to help come up with other names. Possibly biased by her computer based nature.

"Why Glitch?"

"You have bugs everywhere!"
Dragonfly might wind up a bit too-obviously linked to Dragon, but could be a good option, and offers a lot of realistic color options, much like Butterfly would.

And Kid Win based his look on Hero -- the bigger surprise would be if the name wasn't either already in use or being trademark-camped by the Protectorate, Guild, or Dragon herself. As for having a connection in their heroic identities... why not? Just say they "happened to come in contact" and Dragon traded some of the more basic and durable sort of gadgets for samples of her spider silk, or just plain decline to comment further than the bare facts.
 
The "dormant credentials" being deactivated were the current admin access ones for Dragon, I believe. Not a universal "every dormant credential, everywhere, from here until indefinitely in the future".
The author spelled it out. I don't know how anyone could miss it. It couldn't have been clearer.

Four other terminals were listed, but three were 'offline'. The last was very much active, but listed as being a lower-security backup terminal...with everything it did logged such that this one could see it.
[...]
Following that up by revoking the credentials for the terminals that hadn't been seen in years was more basic security maintenance than anything else, in her opinion.


Accounts for three terminals not being used since Newfoundland sank disabled. Ascalon being the fourth and currently active left running at that point.
 
The author spelled it out. I don't know how anyone could miss it. It couldn't have been clearer.

Four other terminals were listed, but three were 'offline'. The last was very much active, but listed as being a lower-security backup terminal...with everything it did logged such that this one could see it.
[...]
Following that up by revoking the credentials for the terminals that hadn't been seen in years was more basic security maintenance than anything else, in her opinion.


Accounts for three terminals not being used since Newfoundland sank disabled. Ascalon being the fourth and currently active left running at that point.
Not quite.
Taylor revoked the credentials for and self-destructed the Ascalon terminal that Saint had.

Then she locked out the remaining three terminals that had all been inactive since Newfoundland sunk.

Leaving the unit Taylor has with the only one remaining that has valid credentials. Which means even if Saint finds another unit, it'll be useless.
 
Then she locked out the remaining three terminals that had all been inactive since Newfoundland sunk.

Leaving the unit Taylor has with the only one remaining that has valid credentials. Which means even if Saint finds another unit, it'll be useless.
Leaving no backup for if the one Taylor has is lost, stolen, or damaged. Computer hardware breaks down all the time.

That said, I was commenting on how that so-called "good security practice" backfired spectacularly on a number of companies in the Chicagoland area in the spring of 2020 between mid-March and late April or May when they furloughed workers because of the official governor-ordered shutdown for at least five weeks, then found none of the computers worked because of "good security practices".
 
Last edited:
Leaving no backup for if the one Taylor has is lost or stolen.

That said, I was commenting on how that so-called "good security practice" backfired spectacularly on a number of companies in the Chicagoland area in 2020.
Taylor doesn't know where any of the others are. And even if she did, she probably wouldn't be able to get them.
Though, if she did somehow get her hands on one, she may or may not be able to reauthorize it.
She does, however, know that the other active unit was being badly misused, presumably by someone who wasn't supposed to have it.


Taylor changed the password on the one she has, so presumably it'd be harder for someone else to be able to use. Especially since the one she has seems to have a low level subsentient AI managing the security, as it was able to determine that Annette was dead and she was Annette's daughter. Presumably the systems responsible for that would also notice if someone stole and tried to use it.


Taylor not having a backup access method is potentially an issue. But I suspect that she (and Dragon) would consider the risk of nobody having access less of a concern than some random person finding one of the missing units and figuring out a way in.

--

That said, yeah, automatically locking out credentials after a month is an issue when things like the Covid lockdowns and quarantines happen. Though, to be fair, that's a not entirely unreasonable security measure under more normal conditions, where it can be reasonably be expected that things aren't normally going to be dormant for more than a few days at a time, unless something goes badly wrong, and people are going to be in the office most days.

On the other hand, since the in-story period of dormancy had been years, that's kind of a long time. Oh, sure, there are circumstances where leaving credentials valid even after that period of dormancy would be reasonable, but even there I'd expect that most of the time such long dormancy would result in downgrading the access levels and permissions of a given set of credentials.
 
On the other hand, since the in-story period of dormancy had been years, that's kind of a long time. Oh, sure, there are circumstances where leaving credentials valid even after that period of dormancy would be reasonable, but even there I'd expect that most of the time such long dormancy would result in downgrading the access levels and permissions of a given set of credentials.

EDIT: Forget the below, this isn't the place to debate security practices that are more trouble than they are worth. It would just be a derail and add nothing to the story snippet. Also forget I said anything on the topic of the automatic deactivation of credentials previously on this thread, it is a useless derail. Sorry about that. I won't say it was useless to debate, just that this isn't the place for it.
I can think of one right away.
You replace a server, but keep the old one in storage as an emergency backup in case the new system breaks down so you can install it immediately to help the backup server handle the peak load while you wait for the new one to be fixed or replaced.
It makes sense for small or even mid-sized companies to do this when they only have a primary and a backup server, and even more sense if they only have a primary server with no redundant backup for very small businesses.
In that scenario having the credentials automatically deactivated after a month would defeat the purpose as you wouldn't be able to plug it in and get it running right away but have to re-image and reconfigure it all from scratch.

Here's another: Spare computers that are not assigned to any person but are kept around for when somebody needs a terminal back up and running immediately. If you deactivate the admin passwords automatically, you can't just plug them in and assign them to somebody...
 
Last edited:
Clockblocker and Vista perhaps? I think they'd be safe enough, so long as you don't swarm them with insects.
Totally swarm Clockblocker. Especially if he pulls that hand-shake freeze prank. Otherwise give the guy a chance. Or a couple.

Keep them away from Vista. Girl has enough issue without adding creepy crawlers to it. Do have Dragon look into her family issue though.

Other than that, I wonder just what sort of hijinks the two can get up to.
 
Totally swarm Clockblocker. Especially if he pulls that hand-shake freeze prank. Otherwise give the guy a chance. Or a couple.
Now I'm remembering @Slider214 /Temporal Knight's/Transformer214 "Cut Strings" where something like that happens in chapter 8. I'm not sure if I can link for it since it's rated NSFW mostly because of pre-story rape and dealing with recovering from some serious trauma where the rape was the least of the trauma, but it's on QQ and AO3.
On QQ he goes by Transformer214, on AO3 it's Slider (TemporalKnight).
The scene in question is chapter 8.
 
Last edited:
Now I'm remembering @Slider214 /Temporal Knight's/Transformer214 "Cut Strings" where something like that happens in chapter 8. I'm not sure if I can link for it since it's rated NSFW, but it's on QQ and AO3.
On QQ he goes by Transformer214, on AO3 it's Slider (TemporalKnight).
The scene in question is chapter 8.
And the only problem Battery had with any of Taylor's reaction is where did you even pull that knife from?
 
That question broke my suspension of disbelief, because Dragon shouldn't have enough information at that point to suspect any bad interactions. As an alternative, she (or Armsmaster himself) could've asked what Taylor did to Lung, and then Dragon could've suspected bad interaction and warned Armsmaster.

Didn't break mine, but I am long used to putting my disbelief into time out and distracting it with porn when it comes to fiction that I read. Then again, I am also aware that forums like this and SB are ones where we overthink and obsess about little details to an absurd degree that would have a psychologist unused to internet phenomena wonder what kind of obsession related mental disorders people here may have.

The answer is, of course, yes. For all of us. :p

... let me guess, the researchers were doing it for a bet, a dare or "Why the hell not?"? Trust me, I'm Italian too, I know.

I am more surprised that scientists elsewhere didn't try it first. Italians aren't unique in doing it for shits and giggles or for a bet, after all.
 
Probably working off the assumption that this is the work laptop - the one that held The Good Stuff, and was probably his machine for working on those ideas that might allow him to improve Dragon. His A.I. workshop, if you will.
 
You know, there's one detail that I think we've overlooked

Does Dragon have a brother/sister?
Canonically, Richter made several lesser AI that weren't capable of achieving sapience to do various tasks for him, like the "Robin Hood" program that appropriated money from criminal organisations. Cauldron "borrowed" that one after his death, for example. So it's probably just those.
 
Back
Top